


default search action
Mingchu Li
Person information
- affiliation: Dalian University of Technology, School of Software, Dalian, China
- affiliation: Tianjin University, Department of Computer Science and Technology, Tianjin, China
- affiliation (PhD 1997): University of Toronto, Department of Mathematics, Toronto, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j149]Ikhlas Al-Hammadi
, Mingchu Li, Sardar M. N. Islam, Esmail Almosharea:
Collaborative computation offloading for scheduling emergency tasks in SDN-based mobile edge computing networks. Comput. Networks 238: 110101 (2024) - [j148]Wenhao Ren, Zichuan Xu, Weifa Liang
, Haipeng Dai
, Omer F. Rana
, Pan Zhou, Qiufen Xia
, Haozhe Ren, Mingchu Li, Guowei Wu:
Learning-driven service caching in MEC networks with bursty data traffic and uncertain delays. Comput. Networks 250: 110575 (2024) - [j147]Mohammed Albishari
, Mingchu Li, Majid Ayoubi
, Ala Alsanabani, Jiyu Tian:
Federated deep learning models for detecting RPL attacks on large-scale hybrid IoT networks. Comput. Networks 254: 110837 (2024) - [j146]Ling Chen, Mingchu Li:
Equilibrium analysis for multi-defender Stackelberg security games under a logit tie-breaking rule. J. Control. Decis. 11(4): 669-677 (2024) - [j145]Hui Shi
, Ziyi Zhou, Jianhao Qin, Jianing Geng, Mingchu Li:
A reversible data hiding in encrypted image based on additive secret sharing with adaptive bit-plane prediction. Multim. Tools Appl. 83(14): 41525-41553 (2024) - [j144]Hui Shi
, Baoyue Hu, Ziyi Zhou, Mingchu Li, Shiying Li:
A secure color image dual watermarking combining block feature modulation and voting mechanism for authentication and copyright protection. Multim. Tools Appl. 83(16): 46893-46945 (2024) - [j143]Kun Lu, Guorui Xu, Runfa Zhang, Mingchu Li, Rongda Li:
DDPG-based optimal task placement strategy for computation offloading in green mobile edge networks. Peer Peer Netw. Appl. 17(4): 2435-2449 (2024) - [j142]Qingrun Zeng
, Jiahao Huang, Jianzhong He, Shengwei Chen, Lei Xie, Zan Chen
, Wenlong Guo, Sun Yao
, Mengjun Li, Mingchu Li, Yuanjing Feng
:
Automated Identification of the Retinogeniculate Visual Pathway Using a High-Dimensional Tractography Atlas. IEEE Trans. Cogn. Dev. Syst. 16(3): 818-827 (2024) - [j141]Jianyuan Gan
, Mingchu Li
, Qing Li
, Runfa Zhang
, Xiao Zheng:
IUAV Path Planning Using a Multiobjective Projection Algorithm. IEEE Trans. Ind. Informatics 20(11): 13069-13076 (2024) - [c100]Mingchu Li, Junhao Huang, Zhihua Wang:
Offloading DNN Tasks Based on Graph Reinforcement Learning in Client-Edge-Cloud Environment. IJCNN 2024: 1-8 - [c99]Kun Lu, Tao Xu, Mingchu Li, Zhihua Wang:
Joint Dynamic Role Switching Scheme and Cooperative Task Offloading Optimization for UAV Swarm-Enabled Edge Computing. IJCNN 2024: 1-8 - [c98]Lei Xie, Qingrun Zeng, Huajun Zhou, Guoqiang Xie, Mingchu Li, Jiahao Huang, Jianan Cui, Hao Chen, Yuanjing Feng:
Anatomy-Guided Fiber Trajectory Distribution Estimation for Cranial Nerves Tractography. ISBI 2024: 1-5 - [c97]Xiaowei Zhao, Hua Yang, Mingchu Li:
Graph Reinforcement Learning Based Multi-Hotspot Region UAV Dynamic Scheduling in Mobile Edge Computing. WCNC 2024: 1-6 - [c96]Mingchu Li, Zhihua Wang:
Cost-AoI Aware Task Scheduling in Industrial IOT Based on Serverless Edge Computing. WCNC 2024: 1-6 - [i4]Lei Xie, Qingrun Zeng, Huajun Zhou, Guoqiang Xie, Mingchu Li, Jiahao Huang, Jianan Cui, Hao Chen, Yuanjing Feng:
Anatomy-guided fiber trajectory distribution estimation for cranial nerves tractography. CoRR abs/2402.18856 (2024) - [i3]Jiyu Tian, Mingchu Li, Zumin Wang, Liming Chen, Jing Qin, Runfa Zhang:
OMLog: Online Log Anomaly Detection for Evolving System with Meta-learning. CoRR abs/2410.16612 (2024) - 2023
- [j140]Amina Cherraf
, Mingchu Li, Anes Moulai-Khatir, Hamidaoui Meryem
:
Mathematical Modeling of the Tumor-Immune System with Time Delay and Diffusion. Axioms 12(2): 184 (2023) - [j139]Hui Shi
, Shouquan Zhou, Meihan Chen, Mingchu Li:
A novel zero-watermarking algorithm based on multi-feature and DNA encryption for medical images. Multim. Tools Appl. 82(23): 36507-36552 (2023) - [j138]Kun Lu, Rongda Li, Mingchu Li, Guorui Xu:
MADDPG-based joint optimization of task partitioning and computation resource allocation in mobile edge computing. Neural Comput. Appl. 35(22): 16559-16576 (2023) - [j137]Qing Li
, Mingchu Li, Yuan Tian, Jianyuan Gan
:
A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment. Reliab. Eng. Syst. Saf. 229: 108855 (2023) - [j136]Ikhlas Al-Hammadi
, Mingchu Li, Sardar M. N. Islam:
Independent tasks scheduling of collaborative computation offloading for SDN-powered MEC on 6G networks. Soft Comput. 27(14): 9593-9617 (2023) - [j135]Mohammed Albishari, Mingchu Li, Runfa Zhang, Esmail Almosharea:
Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks. J. Supercomput. 79(3): 2626-2653 (2023) - [j134]Zichuan Xu
, Dapeng Zhao, Weifa Liang
, Omer F. Rana
, Pan Zhou
, Mingchu Li
, Wenzheng Xu
, Hao Li, Qiufen Xia
:
HierFedML: Aggregator Placement and UE Assignment for Hierarchical Federated Learning in Mobile Edge Computing. IEEE Trans. Parallel Distributed Syst. 34(1): 328-345 (2023) - [c95]Mingchu Li, Wenteng Zhang, Dexin Xia:
Transformer Inference Acceleration in Edge Computing Environment. CCGridW 2023: 104-109 - [c94]Mingchu Li
, Dexin Xia
, Wenteng Zhang
:
Dynamic Offloading Task for Internet of Things Based on Meta Supervised Learning. CNCIT 2023: 87-92 - [c93]Kun Lu
, Quan Zhou
, Mingchu Li
:
Computation Offloading in E-RAN via Deep Reinforcement Learning. CNCIT 2023: 105-109 - [c92]Xiaowei Zhao
, Lian Zhang
, Mingchu Li
:
Context-Aware Edge Caching Strategy Based On Mobility Prediction. CNCIT 2023: 127-132 - [c91]Xiaowei Zhao
, Yuanyuan Zhang
, Mingchu Li
:
Task Migration Optimization Algorithm in Mobile Edge Computing. CNCIT 2023: 133-137 - [c90]Zixiang Zhou
, Mingchu Li
:
Deep Reinforcement Learning based Edge-Enabled Vehicle to Everything Service Placement for 5G Millimeter Wave. CNCIT 2023: 138-142 - [c89]Mingchu Li, Wanying Qi, Shuai Li:
Task Offloading in UAV-to-Cell MEC Networks: Cell Clustering and Path Planning. CollaborateCom (2) 2023: 3-19 - [c88]Mingchu Li, Shuai Li, Wanying Qi:
Dynamic Offloading Based on Meta Deep Reinforcement Learning and Load Prediction in Smart Home Edge Computing. CollaborateCom (1) 2023: 421-439 - 2022
- [j133]Xiaodong Chen, Mingchu Li, Liming Xiong:
Two completely independent spanning trees of claw-free graphs. Discret. Math. 345(12): 113080 (2022) - [j132]Ling Chen
, Mingchu Li
, Jia Liu:
Modeling bluffing behavior in signaling security games. Int. Trans. Oper. Res. 29(3): 1825-1841 (2022) - [j131]Qing Li
, Mingchu Li, Zhongqiang Gong, Yuan Tian, Runfa Zhang
:
Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers. Reliab. Eng. Syst. Saf. 223: 108440 (2022) - [j130]Xiao Zheng, Mingchu Li, Syed Bilal Hussain Shah, Dinh-Thuan Do
, Yuanfang Chen, Constandinos X. Mavromoustakis, George Mastorakis, Evangelos Pallis:
Enhancing Security-Problem-Based Deep Learning in Mobile Edge Computing. ACM Trans. Internet Techn. 22(2): 49:1-49:15 (2022) - [j129]Zichuan Xu
, Haozhe Ren
, Weifa Liang
, Qiufen Xia
, Wanlei Zhou, Pan Zhou
, Wenzheng Xu
, Guowei Wu
, Mingchu Li
:
Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks. IEEE/ACM Trans. Netw. 30(6): 2601-2615 (2022) - [c87]Kun Lu, Jianyu Song, Linlin Yang, Guorui Xu, Mingchu Li:
Dynamic Service Placement Algorithm for Partitionable Applications in Mobile Edge Computing. CCGRID 2022: 1036-1041 - [c86]Mingchu Li, Linlin Yang, Kun Lu, Syed Bilal Hussain Shah, Xiao Zheng:
Device-to-Device Task Offloading in a Stochastic Invalid-Device Scenario with Social Awareness. DSC 2022: 1-7 - [c85]Yufeng Xie, Mingchu Li, Kun Lu, Syed Bilal Hussain Shah, Xiao Zheng:
Multi-task Learning Model based on Multiple Characteristics and Multiple Interests for CTR prediction. DSC 2022: 1-7 - [c84]Zichuan Xu, Wenhao Ren, Weifa Liang, Wenzheng Xu, Qiufen Xia, Pan Zhou, Mingchu Li:
Schedule or Wait: Age-Minimization for IoT Big Data Processing in MEC via Online Learning. INFOCOM 2022: 1809-1818 - [c83]Esmail Almosharea, Mingchu Li, Runfa Zhang, Mohammed Albishari, Ikhlas Al-Hammadi
, Gehad Abdullah Amran
, Ebraheem Farea:
Aerial-Aerial-Ground Computation Offloading Using High Altitude Aerial Vehicle and Mini-drones. WASA (3) 2022: 563-571 - 2021
- [j128]Runfa Zhang
, Mingchu Li, Mohammed Albishari, Fu-Chang Zheng
, Zhong-Zhou Lan:
Generalized lump solutions, classical lump solutions and rogue waves of the (2+1)-dimensional Caudrey-Dodd-Gibbon-Kotera-Sawada-like equation. Appl. Math. Comput. 403: 126201 (2021) - [j127]Qing Li
, Mingchu Li, Jianyuan Gan
, Cheng Guo:
A game-theoretic approach for the location of terror response facilities with both disruption risk and hidden information. Int. Trans. Oper. Res. 28(4): 1864-1889 (2021) - [j126]Bo Wang
, Mingchu Li:
Resource Allocation Scheduling Algorithm Based on Incomplete Information Dynamic Game for Edge Computing. Int. J. Web Serv. Res. 18(2): 1-24 (2021) - [j125]Qing Li
, Mingchu Li, Runfa Zhang
, Jianyuan Gan
:
A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy. Reliab. Eng. Syst. Saf. 216: 108005 (2021) - [j124]Xing Jin
, Mingchu Li
, Zhen Wang
, Cheng Guo
, Hong Ding, Yong Guan:
EigenCloud: A Cooperation and Trust-Aware Dependable Cloud File-Sharing Network. IEEE Trans. Comput. Soc. Syst. 8(2): 522-536 (2021) - [j123]Nakema Y. Deonauth
, Mingchu Li
, Shuo Yu
, Xiangtai Chen
:
An Upstream-Reciprocity-Based Strategy for Academic Social Networks Using Public Goods Game. IEEE Trans. Comput. Soc. Syst. 8(6): 1417-1426 (2021) - [j122]Xiao Zheng, Mingchu Li
, Yuanfang Chen
, Jun Guo, Muhammad Alam
, Weitong Hu:
Blockchain-Based Secure Computation Offloading in Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 22(7): 4073-4087 (2021) - [j121]Jia Liu
, Mingchu Li
, William C. Tang
, Sardar M. N. Islam
:
A Cyber Physical System Crowdsourcing Inference Method Based on Tempering: An Advancement in Artificial Intelligence Algorithms. Wirel. Commun. Mob. Comput. 2021: 6618980:1-6618980:11 (2021) - [c82]Kun Lu, Jiaxi Wang, Mingchu Li, Zhiheng Zhang:
Personalized and Quality-Aware Task Recommendation in Collaborative Crowdsourcing. CSCWD 2021: 43-48 - [c81]Kun Qu, Mingchu Li, Qing Li
:
A scenario-based simultaneous game approach for risk-averse facility protection problem. FNC/MobiSPC 2021: 282-289 - [c80]Nakema Deonauth, Xiangtai Chen, Mingchu Li:
Scientific Collaboration Analytics based on Multi-Player Game Theory. IMCOM 2021: 1-4 - 2020
- [j120]Yingjie Wang
, Kuanjiu Zhou, Zumin Wang, Mingchu Li, Nan Chen, Bin Li, Hongxuan Tian:
Research on Real-Time Embedded Software Scheduling Model Based on EDF. IEEE Access 8: 20058-20066 (2020) - [j119]Bo Wang
, Mingchu Li
, Xing Jin
, Cheng Guo
:
A Reliable IoT Edge Computing Trust Management Mechanism for Smart Cities. IEEE Access 8: 46373-46399 (2020) - [j118]Yingmo Jie, Charles Zhechao Liu, Mingchu Li
, Kim-Kwang Raymond Choo
, Ling Chen, Cheng Guo:
Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving. Appl. Math. Comput. 376: 125142 (2020) - [j117]Yingjie Wang, Kuanjiu Zhou, Jie Pan, Mingchu Li:
Interrupt nesting method based on time slice in embedded software. Int. J. Inf. Commun. Technol. 17(2): 107-128 (2020) - [j116]Yingmo Jie
, Cheng Guo
, Kim-Kwang Raymond Choo
, Charles Zhechao Liu, Mingchu Li
:
Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment. IEEE Internet Things J. 7(4): 3041-3052 (2020) - [j115]Ling Chen
, Mingchu Li
, Ling Qin, Yingmo Jie:
A game-theoretic approach for channel security against active time-varying attacks based on artificial noise. J. Ambient Intell. Humaniz. Comput. 11(6): 2215-2224 (2020) - [j114]Jia Liu
, Mingchu Li, Yuanfang Chen
, Sardar M. N. Islam
, Noël Crespi:
Variational Channel Estimation with Tempering: An Artificial Intelligence Algorithm for Wireless Intelligent Networks. Sensors 20(20): 5939 (2020) - [j113]Cheng Guo
, Xue Chen, Yingmo Jie
, Zhangjie Fu
, Mingchu Li
, Bin Feng:
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption. IEEE Trans. Serv. Comput. 13(6): 1034-1044 (2020) - [c79]Qiufen Xia, Wenhao Ren
, Mingchu Li, Jiankang Ren:
Age-Aware Query Evaluation for Big Data Analytics in Mobile Edge Clouds. HPCC/DSS/SmartCity 2020: 214-222 - [c78]Faxue Yang, Kun Lu, Mingchu Li
, Shuxin Chen, Yuanfang Chen, Mohsen Guizani
, Weitong Hu:
Text Data Truth Discovery Using Self-confidence of Sources. IWCMC 2020: 131-136
2010 – 2019
- 2019
- [j112]Xiao Zheng
, Mingchu Li
, Muhammad Tahir, Yuanfang Chen
, Muhammad Alam:
Stochastic Computation Offloading and Scheduling Based on Mobile Edge Computing. IEEE Access 7: 72247-72256 (2019) - [j111]Yingmo Jie, Kim-Kwang Raymond Choo
, Mingchu Li
, Ling Chen, Cheng Guo:
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model. Future Gener. Comput. Syst. 101: 169-179 (2019) - [j110]Chettupally Anil Carie, Mingchu Li, Bhaskar Marapelli
, Prakasha Reddy
, Hayat Dino Bedru, Moneeb Gohar:
Cognitive radio assisted WSN with interference aware AODV routing protocol. J. Ambient Intell. Humaniz. Comput. 10(10): 4033-4042 (2019) - [j109]Yingjie Wang, Kuanjiu Zhou, Mingchu Li:
实时嵌入式系统的WCET分析与预测研究综述 (Survey of WCET Analysis and Prediction for Real-time Embedded Systems). 计算机科学 46(6A): 16-22 (2019) - [j108]Mingchu Li
, Xing Jin, Cheng Guo, Jia Liu, Guanghai Cui, Tie Qiu:
RIMNet: Recommendation Incentive Mechanism based on evolutionary game dynamics in peer-to-peer service networks. Knowl. Based Syst. 166: 156-169 (2019) - [j107]Jia Liu, Mingchu Li, Muhammad Alam, Yuanfang Chen, Ting Wu:
A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism. Mob. Networks Appl. 24(4): 1279-1294 (2019) - [j106]Yingmo Jie, Mingchu Li
, Cheng Guo
, Bin Feng, Tingting Tang:
A new construction of compressed sensing matrices for signal processing via vector spaces over finite fields. Multim. Tools Appl. 78(22): 31137-31161 (2019) - [c77]Mingchu Li, Tingting Tang, Yuanfang Chen, Md. Zakirul Alam Bhuiyan:
Transportation and Charging Schedule for Autonomous Electric Vehicle Riding-Sharing System Considering Battery Degradation. DependSys 2019: 203-216 - [c76]Mingchu Li, Xian Yang, Yuanfang Chen, Md. Zakirul Alam Bhuiyan:
Optimal Personalized DDoS Attacks Detection Strategy in Network Systems. DependSys 2019: 327-340 - [c75]Yanan Zhao
, Mingchu Li
, Cheng Guo
:
Developing Patrol Strategies for the Cooperative Opportunistic Criminals. ICA3PP (1) 2019: 454-467 - [c74]Hui Shi, Ting Dong, Yanni Li, Cheng Guo, Mingchu Li:
An Intelligent Information Hiding Scheme Based on Histogram Translation in Frequency Domain. ISKE 2019: 948-954 - [c73]Jia Liu, William C. Tang
, Yuanfang Chen, Mingchu Li
, Mohsen Guizani:
A Novel Crowd-sourcing Inference Method. IWCMC 2019: 55-60 - [c72]Xiao Zheng, Mingchu Li
, Yuanfang Chen, Mohsen Guizani, Jia Liu, Muhammad Tahir:
Solving Security Problems in MEC Systems. IWCMC 2019: 1847-1852 - [p1]Jia Liu, Mingchu Li
, Zitong Feng, Cheng Guo, Lifeng Yuan, Muhammad Alam:
An Evolutionary Game-Based Mechanism for Unwanted Traffic Control. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 37-51 - 2018
- [j105]Yingmo Jie, Mingchu Li, Cheng Guo
, Ling Chen:
Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping. IEEE Access 6: 51374-51383 (2018) - [j104]Xiaodong Chen, Mingchu Li, Fuliang Lu:
Spanning 3-ended trees in quasi-claw-free graphs. Ars Comb. 138: 161-170 (2018) - [j103]Chettupally Anil Carie, Mingchu Li, Chang Liu
, Prakasha Reddy
, Waseef Jamal:
Hybrid Directional CR-MAC based on Q-Learning with Directional Power Control. Future Gener. Comput. Syst. 81: 340-347 (2018) - [j102]Yingmo Jie, Xinyu Tang, Kim-Kwang Raymond Choo
, Shenghao Su, Mingchu Li
, Cheng Guo:
Online task scheduling for edge computing based on repeated stackelberg game. J. Parallel Distributed Comput. 122: 159-172 (2018) - [j101]Cheng Guo
, Huan Zhang, Zhangjie Fu, Bin Feng, Mingchu Li
:
A novel proactive secret image sharing scheme based on LISS. Multim. Tools Appl. 77(15): 19569-19590 (2018) - [j100]Yingmo Jie, Cheng Guo
, Mingchu Li
, Bin Feng:
Construction of compressed sensing matrices for signal processing. Multim. Tools Appl. 77(23): 30551-30574 (2018) - [j99]Xing Jin
, Mingchu Li, Xiaomei Sun, Cheng Guo, Jia Liu:
Reputation-based multi-auditing algorithmic mechanism for reliable mobile crowdsensing. Pervasive Mob. Comput. 51: 73-87 (2018) - [j98]Ruchdee Binmad
, Mingchu Li
:
Psychology-Inspired Trust Restoration Framework in Distributed Multiagent Systems. Sci. Program. 2018: 7515860:1-7515860:15 (2018) - [c71]Mingchu Li, Xiaomei Sun, Xing Jin, Linlin Tian:
Worker Recommendation with High Acceptance Rates in Collaborative Crowdsourcing Systems. CollaborateCom 2018: 53-74 - [c70]Ling Chen
, Mingchu Li
, Ling Qin, Yingmo Jie:
A Game-theoretic Approach for Channel Security Against Active Time-Varying attacks Based on Artificial Noise. FNC/MobiSPC 2018: 212-218 - [c69]Mingchu Li, Yuanpeng Cao:
Optimally Protecting Elections with Uncertainty about Voter Preferences. FNC/MobiSPC 2018: 251-258 - [c68]Ruchdee Binmad, Mingchu Li
, Nakema Deonauth, Theerawat Hungsapruek
, Aree Limwudhikraijirath:
The Competitions of Forgiving Strategies in the Iterated Prisoner's Dilemma. ICA 2018: 39-43 - [c67]Mingchu Li, Yuanyuan Zheng, Xing Jin, Cheng Guo:
Task Assignment for Simple Tasks with Small Budget in Mobile Crowdsourcing. MSN 2018: 68-73 - 2017
- [j97]Kun Lu
, Shiyu Wang, Guanghai Cui, Mingchu Li
, Hannan Bin Liaqat:
Multi-Reciprocity Policies Co-Evolution Based Incentive Evaluating Framework for Mobile P2P Systems. IEEE Access 5: 3313-3321 (2017) - [j96]Gang Hou, Kuanjiu Zhou, Tie Qiu
, Weiqiang Kong, Mingchu Li:
Performance Evaluation for Interrupt-Driven Embedded Software Based on EDSPN. IEEE Access 5: 5178-5189 (2017) - [j95]Kai Cui, Kuanjiu Zhou, Houbing Song
, Mingchu Li:
Automated Software Testing Based on Hierarchical State Transition Matrix for Smart TV. IEEE Access 5: 6492-6501 (2017) - [j94]Xiaodong Chen, Mingchu Li, Meijin Xu:
Spanning 3-ended trees in k-connected claw-free graphs. Ars Comb. 131: 161-168 (2017) - [j93]Kai Cui, Kuanjiu Zhou, Tie Qiu, Mingchu Li, Leiming Yan:
A hierarchical combinatorial testing method for smart phone software in wearable IoT systems. Comput. Electr. Eng. 61: 250-265 (2017) - [j92]Gang Hou, Kuanjiu Zhou, Tie Qiu, Xun Cao, Mingchu Li, Jie Wang:
A novel green software evaluation model for cloud robotics. Comput. Electr. Eng. 63: 139-156 (2017) - [j91]Tie Qiu, Xize Liu, Min Han, Mingchu Li, Yushuang Zhang:
SRTS : A Self-Recoverable Time Synchronization for sensor networks of healthcare IoT. Comput. Networks 129: 481-492 (2017) - [j90]Ruchdee Binmad, Mingchu Li
, Zhen Wang, Nakema Deonauth, Chettupally Anil Carie:
An Extended Framework for Recovering From Trust Breakdowns in Online Community Settings. Future Internet 9(3): 36 (2017) - [j89]Lifeng Yuan, Mingchu Li, Cheng Guo, Wei-Tong Hu, Zhi-Hui Wang:
A Verifiable E-voting Scheme with Secret Sharing. Int. J. Netw. Secur. 19(2): 260-271 (2017) - [j88]Kai Cui, Jie Wang, Houbing Song
, Chi Lin
, Kuanjiu Zhou, Mingchu Li:
Effective hybrid load scheduling of online and offline clusters for e-health service. Neurocomputing 220: 60-66 (2017) - [j87]Yingmo Jie, Mingchu Li, Tingting Tang, Cheng Guo:
Optimal Allocation Strategy Based on Stackelberg Game for Inspecting Drunk Driving on Traffic Network. KSII Trans. Internet Inf. Syst. 11(12): 5759-5779 (2017) - [j86]Hui Shi, XiangHai Wang, Mingchu Li, Jun Bai, Bin Feng:
Secure variable-capacity self-recovery watermarking scheme. Multim. Tools Appl. 76(5): 6941-6972 (2017) - [j85]Cheng Guo
, Qiongqiong Yuan, Kun Lu, Mingchu Li
, Zhangjie Fu:
(t, n) Threshold secret image sharing scheme with adversary structure. Multim. Tools Appl. 76(20): 21193-21210 (2017) - [j84]Kun Lu, Shiyu Wang, Ling Xie, Zhen Wang
, Mingchu Li:
Modeling altruism agents: Incentive mechanism in autonomous networks with other-regarding preference. Peer-to-Peer Netw. Appl. 10(5): 1169-1181 (2017) - [j83]Ruchdee Binmad
, Mingchu Li
:
Improving the Efficiency of an Online Marketplace by Incorporating Forgiveness Mechanism. ACM Trans. Internet Techn. 17(1): 9:1-9:20 (2017) - [j82]Xinxin Fan, Ling Liu, Mingchu Li, Zhiyuan Su:
GroupTrust: Dependable Trust Management. IEEE Trans. Parallel Distributed Syst. 28(4): 1076-1090 (2017) - [c66]Linlin Tian, Mingchu Li, Hong Yu, Xing Jin:
Attribute-Based Partner Updating Boosts Cooperation in Social P2P Systems. DASC/PiCom/DataCom/CyberSciTech 2017: 1226-1231 - [c65]Mingchu Li
, Gang Tian, Kun Lu:
TALENTED: An Advanced Guarantee Public Order Tool for Urban Inspectors. QSHINE 2017: 228-237 - [c64]Kun Lu, Jingchao Yang, Haoran Gong, Mingchu Li
:
Classification-Based Reputation Mechanism for Master-Worker Computing System. QSHINE 2017: 238-247 - [c63]Mingchu Li, Yuanpeng Cao, Tie Qiu:
Optimal patrol strategies against attacker's persistent attack with multiple resources. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - 2016
- [j81]Xiaodong Chen, Mingchu Li, Wei Liao, Hajo Broersma:
Hamiltonian properties of almost locally connected claw-free graphs. Ars Comb. 124: 95-109 (2016) - [j80]Kun Lu, Shiyu Wang, Ling Xie, Zhen Wang
, Mingchu Li:
A dynamic reward-based incentive mechanism: Reducing the cost of P2P systems. Knowl. Based Syst. 112: 105-113 (2016) - [j79]Hui Shi, Mingchu Li, Cheng Guo, Ru Tan:
A region-adaptive semi-fragile dual watermarking scheme. Multim. Tools Appl. 75(1): 465-495 (2016) - [j78]Cheng Guo, Huan Zhang, Qiongqiong Song, Mingchu Li:
A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem. Multim. Tools Appl. 75(18): 11577-11594 (2016) - [j77]Kun Lu, Junlong Wang, Mingchu Li:
An Eigentrust dynamic evolutionary model in P2P file-sharing systems. Peer-to-Peer Netw. Appl. 9(3): 599-612 (2016) - [j76]Mingchu Li, Xiaodong Xu, Cheng Guo, Xing Tan:
AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement. Secur. Commun. Networks 9(11): 1340-1352 (2016) - [j75]Ruicong Han, Xuefeng Zhao, Yan Yu, Quanhua Guan, Wei-Tong Hu, Mingchu Li:
A Cyber-Physical System for Girder Hoisting Monitoring Based on Smartphones. Sensors 16(7): 1048 (2016) - [c62]Mingchu Li
, Junlong Wang, Kun Lu, Cheng Guo, Xing Tan:
A Novel Reputation Management Mechanism with Forgiveness in P2P File Sharing Networks. FNC/MobiSPC 2016: 360-365 - [c61]Kun Lu, Junlong Wang, Ling Xie, Qilong Zhen, Mingchu Li
:
An EigenTrust-based Hybrid Trust Model in P2P File Sharing Networks. FNC/MobiSPC 2016: 366-371 - [c60]Mingchu Li, Quanhua Guan, Xing Jin, Cheng Guo, Xing Tan, Yongli Gao:
Personalized pre-trust reputation management in social P2P network. ICNC 2016: 1-5 - [c59]Kun Lu, Shiyu Wang, Ling Xie, Mingchu Li:
Study of Self-adaptive Strategy Based Incentive Mechanism in Structured P2P System. ICIC (3) 2016: 658-670 - [c58]Mingchu Li
, Shiyu Wang, Kun Lu:
A dynamic bandwidth pricing mechanism based on trust management in P2P streaming systems. IPCCC 2016: 1-8 - [c57]Gang Hou, Kuanjiu Zhou, Yanran Wu, Zongzheng Chi, Jie Wang, Mingchu Li:
ETSTM: A New Green Software Model. Trustcom/BigDataSE/ISPA 2016: 1825-1830 - [c56]Shiyu Wang, Kun Lu, Mingchu Li, Qilong Zhen, Xiaoyu Che:
Fighting Pollution Attack in Peer-to-Peer Streaming Systems: A Dynamic Reputation Management Approach. TSA 2016: 23-28 - 2015
- [j74]Wei Liao, Mingchu Li:
[r, s, t]-colorings of fans. Ars Comb. 119: 263-273 (2015) - [j73]Guanghai Cui, Mingchu Li, Zhen Wang
, Jiankang Ren, Dong Jiao, Jianhua Ma:
Analysis and evaluation of incentive mechanisms in P2P networks: a spatial evolutionary game theory perspective. Concurr. Comput. Pract. Exp. 27(12): 3044-3064 (2015) - [j72]Xiaodong Chen, Mingchu Li, Xin Ma:
Vertex Pancyclicity of Quadrangularly Connected Claw-free Graphs. Graphs Comb. 31(6): 2125-2136 (2015) - [j71]Wei Liao, Mingchu Li:
[r, s, t]-Colorings of Friendship Graphs and Wheels. Graphs Comb. 31(6): 2275-2292 (2015) - [j70]Yan Yu, Ruicong Han, Xuefeng Zhao, Xingquan Mao
, Wei-Tong Hu, Dong Jiao, Mingchu Li, Jinping Ou:
Initial Validation of Mobile-Structural Health Monitoring Method Using Smartphones. Int. J. Distributed Sens. Networks 11: 274391:1-274391:14 (2015) - [j69]Bin Feng, Cheng Guo, Mingchu Li, Zhi-Hui Wang:
A Novel Proactive Multi-secret Sharing Scheme. Int. J. Netw. Secur. 17(2): 123-128 (2015) - [j68]Chengming Li, Wenjing Liu, Lei Wang, Mingchu Li, Koji Okamura:
Energy-efficient quality of service aware forwarding scheme for Content-Centric Networking. J. Netw. Comput. Appl. 58: 241-254 (2015) - [j67]Xing-Tian Wang, Mingchu Li, Szu-Ting Wang, Chin-Chen Chang:
Reversible data hiding exploiting high-correlation regulation for high-quality images. Secur. Commun. Networks 8(7): 1408-1421 (2015) - [j66]Mingchu Li, Shu Ma, Cheng Guo:
A novel weighted threshold secret image sharing scheme†. Secur. Commun. Networks 8(17): 3083-3093 (2015) - [j65]Xuefeng Zhao, Hao Liu, Yan Yu, Xiaodong Xu, Wei-Tong Hu, Mingchu Li, Jingping Ou:
Bridge Displacement Monitoring Method Based on Laser Projection-Sensing Technology. Sensors 15(4): 8444-8463 (2015) - [j64]Zhiyuan Su, Ling Liu, Mingchu Li, Xinxin Fan, Yang Zhou:
Reliable and Resilient Trust Management in Distributed Service Provision Networks. ACM Trans. Web 9(3): 14:1-14:37 (2015) - [c55]Gang Hou, Yinfeng Ban, Kuanjiu Zhou, Jie Wang, Mingchu Li, Zihao Liao:
Energy Consumption Analysis Method of CPS Software Based on Architecture Modeling. FCST 2015: 34-39 - [c54]Mingchu Li, Xiaodong Xu, Ruhan Zhuang, Cheng Guo, Xing Tan:
Identity-Based Broadcast Encryption Schemes for Open Networks. FCST 2015: 104-109 - [c53]Lin Lv, Mingchu Li, Yuanfang Chen:
Prediction of Disease Dynamics with Structure Knowledge of Human Contact Networks. FCST 2015: 147-152 - [c52]Xing Jin, Mingchu Li, Guanghai Cui, Jia Liu, Cheng Guo, Yongli Gao, Bo Wang, Xing Tan:
RIMBED: Recommendation Incentive Mechanism Based on Evolutionary Dynamics in P2P Networks. ICCCN 2015: 1-8 - [c51]Ruchdee Binmad, Mingchu Li:
Computational Models Based on Forgiveness Mechanism for Untrustworthy Agents. IES 2015: 29-42 - [c50]Mingchu Li, Wei Jia, Cheng Guo, Weifeng Sun, Xing Tan:
LPSSE: Lightweight Phrase Search with Symmetric Searchable Encryption in Cloud Storage. ITNG 2015: 174-178 - 2014
- [j63]Yuanfang Chen, Mingchu Li, Shaojie Tang, Weifeng Sun:
Impact of Duty Cycle and Radio Range Irregularity on Localization Algorithms for Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 21(3-4): 219-235 (2014) - [j62]Bin Feng, Zhi-Hui Wang, Duo Wang, Ching-Yun Chang, Mingchu Li:
A Novel Reversible Chinese Text Information Hiding Scheme based on Lookalike Traditional and Simplified Chinese Characters. KSII Trans. Internet Inf. Syst. 8(1): 269-281 (2014) - [c49]Yongrui Cui, Hang Zhao, Jun Wu, Zhiyuan Su, Mingchu Li:
A Sensitive and Robust Grid Reputation System Based on Rating of Recommenders. PAAP 2014: 23-28 - 2013
- [j61]Mingchu Li:
Hamiltonian claw-free graphs involving minimum degrees. Discret. Appl. Math. 161(10-11): 1530-1537 (2013) - [j60]Xing-Tian Wang, Chin-Chen Chang, Thai Son Nguyen
, Mingchu Li:
Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digit. Signal Process. 23(2): 569-577 (2013) - [j59]Mingchu Li, Lifeng Yuan
, He Jiang, Bing Liu, Haitze J. Broersma
:
Tank-Ring Factors in Supereulerian Claw-Free Graphs. Graphs Comb. 29(3): 599-608 (2013) - [j58]Xiaodong Chen, Mingchu Li, Xin Ma, Xinxin Fan:
Hamiltonian Connectedness in Claw-Free Graphs. Graphs Comb. 29(5): 1259-1267 (2013) - [j57]Dong Jiao, Mingchu Li, Jinping Ou, Cheng Guo, Yizhi Ren, Yongrui Cui:
Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management. IET Inf. Secur. 7(4): 343-348 (2013) - [j56]Chin-Chen Chang, Kuo-Nan Chen, Zhi-Hui Wang, Mingchu Li:
Lossless Information Hiding in the VQ Index Table. J. Softw. 8(3): 547-553 (2013) - [j55]Zhenzhou Guo, Mingchu Li, Xinxin Fan:
Attribute-based ring signcryption scheme. Secur. Commun. Networks 6(6): 790-796 (2013) - [j54]Xinxin Fan, Mingchu Li, Hui Zhao, Xiaodong Chen, Zhenzhou Guo, Dong Jiao, Weifeng Sun:
Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks. Secur. Commun. Networks 6(9): 1126-1142 (2013) - [j53]Yizhi Ren, Mingchu Li, Yang Xiang
, Yongrui Cui, Kouichi Sakurai:
Evolution of cooperation in reputation system by group-based scheme. J. Supercomput. 63(1): 171-190 (2013) - [c48]Zhiyuan Su, Ling Liu, Mingchu Li, Xinxin Fan, Yang Zhou:
ServiceTrust: Trust Management in Service Provision Networks. IEEE SCC 2013: 272-279 - [c47]Xin Gu, Mingchu Li, Shuzhen Xu:
Research on Indirect Cost of Irregular Flight. ANT/SEIT 2013: 1053-1058 - [c46]Gang Hou, Kuanjiu Zhou, Junwang Chang, Rui Li, Mingchu Li:
Interrupt Modeling and Verification for Embedded Systems Based on Time Petri Nets. APPT 2013: 62-76 - [c45]Yuanfang Chen, Noël Crespi, Lin Lv, Mingchu Li, Antonio Manuel Ortiz, Lei Shu
:
Locating using prior information: wireless indoor localization algorithm. SIGCOMM 2013: 463-464 - 2012
- [j52]Yongrui Cui, Mingchu Li, Yang Xiang
, Yizhi Ren, Silvio Cesare:
A QoS-based fine-grained reputation system in the grid environment. Concurr. Comput. Pract. Exp. 24(17): 1990-2006 (2012) - [j51]Yuanfang Chen, Mingchu Li, Lei Shu
, Lei Wang, Takahiro Hara:
A proportional fairness backoff scheme for funnelling effect in wireless sensor networks. Trans. Emerg. Telecommun. Technol. 23(6): 585-597 (2012) - [j50]Hui Zhao, Mingchu Li, Kouichi Sakurai, Yizhi Ren, Jonathan Z. Sun, Fengying Wang:
A Finite Equivalence of Verifiable Multi-secret Sharing. Int. J. Comput. Intell. Syst. 5(1): 1-12 (2012) - [j49]Dong Jiao, Mingchu Li, Yan Yu, Jinping Ou:
Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j48]Zhi-Hui Wang, Chin-Chen Chang, Mingchu Li:
Optimizing least-significant-bit substitution using cat swarm optimization strategy. Inf. Sci. 192: 98-108 (2012) - [j47]Weifeng Sun, Qiufen Xia, Zichuan Xu, Mingchu Li, Zhenquan Qin
:
A Game Theoretic Resource Allocation Model Based on Extended Second Price Sealed Auction in Grid Computing. J. Comput. 7(1): 65-75 (2012) - [j46]Chi Lin, Guowei Wu, Feng Xia
, Mingchu Li, Lin Yao, Zhongyi Pei:
Energy efficient ant colony algorithms for data aggregation in wireless sensor networks. J. Comput. Syst. Sci. 78(6): 1686-1702 (2012) - [j45]Xinxin Fan, Mingchu Li, Jianhua Ma, Yizhi Ren, Hui Zhao, Zhiyuan Su:
Behavior-based reputation management in P2P file-sharing networks. J. Comput. Syst. Sci. 78(6): 1737-1750 (2012) - [j44]Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai:
Flexible service selection with user-specific QoS support in service-oriented architecture. J. Netw. Comput. Appl. 35(3): 962-973 (2012) - [j43]Wei-Tong Hu, Mingchu Li, Cheng Guo, Yizhi Ren:
Reversible secret image sharing with steganography and dynamic embedding. Secur. Commun. Networks 5(11): 1267-1276 (2012) - [j42]Xing-Tian Wang, Chin-Chen Chang, Chia-Chun Lin, Mingchu Li:
A novel multi-group exploiting modification direction method based on switch map. Signal Process. 92(6): 1525-1535 (2012) - [c44]Xinxin Fan, Ling Liu, Mingchu Li, Zhiyuan Su:
EigenTrustp++: Attack resilient trust management. CollaborateCom 2012: 416-425 - [c43]Mingyang Sun, Weifeng Sun, Lei Shu
, Mingchu Li, Lei Xue:
FoSSicker: A personalized search engine by location-awareness. ICNC 2012: 456-460 - [c42]Weifeng Sun, Haotian Wang, Mingchu Li, Mengci Zhou, Zhenquan Qin:
Research and simulation of transport protocols optimization on wireless multi-hop networks. LCN Workshops 2012: 702-709 - [c41]Guanghai Cui, Mingchu Li, Zhen Wang, Linlin Tian, Jianhua Ma:
Analysis and Evaluation Framework Based on Spatial Evolutionary Game Theory for Incentive Mechanism in Peer-to-Peer Network. TrustCom 2012: 287-294 - [c40]Kun Lu, Hua Jiang, Mingchu Li, Sheng Zhao, Jianhua Ma:
Resources Collaborative Scheduling Model Based on Trust Mechanism in Cloud. TrustCom 2012: 863-868 - [c39]Linlin Tian, Mingchu Li, Weifeng Sun, Xiaowei Zhao, Baohui Wang, Jianhua Ma:
Evolution of Cooperation Based on Reputation on Dynamical Networks. TrustCom 2012: 1399-1404 - [e4]Wei Ding, He Jiang, Moonis Ali, Mingchu Li:
Modern Advances in Intelligent Systems and Tools. Studies in Computational Intelligence 431, Springer 2012, ISBN 978-3-642-30731-7 [contents] - [i2]Chi Lin, Guowei Wu, Feng Xia, Mingchu Li, Lin Yao, Zhongyi Pei:
Energy Efficient Ant Colony Algorithms for Data Aggregation in Wireless Sensor Networks. CoRR abs/1201.0119 (2012) - 2011
- [j41]Jingyu Hua, Mingchu Li, Yizhi Ren, Kouichi Sakurai:
Efficient Context-Sensitive Intrusion Detection Based on State Transition Table. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 255-264 (2011) - [j40]Mingchu Li, Xiaodong Chen, Hajo Broersma
:
Hamiltonian connectedness in 4-connected hourglass-free claw-free graphs. J. Graph Theory 68(4): 285-298 (2011) - [j39]Zhi-Hui Wang, Chin-Chen Chang, Ngoc-Tu Huynh, Mingchu Li:
Sharing a Secret Image in Binary Images with Verification. J. Inf. Hiding Multim. Signal Process. 2(1) (2011) - [j38]Zhi-Hui Wang, Chin-Chen Chang, Mingchu Li, Tzu-Chuen Lu:
A Simple Image Encoding Method with Data Lossless Information Hiding. J. Networks 6(3): 400-407 (2011) - [j37]Yizhi Ren, Mingchu Li, Kouichi Sakurai:
FineTrust: a fine-grained trust model for peer-to-peer networks. Secur. Commun. Networks 4(1): 61-69 (2011) - [j36]Hui Zhao, Mingchu Li, Xinxin Fan:
A formal separation method of protocols to eliminate parallel attacks in virtual organization. Secur. Commun. Networks 4(12): 1461-1468 (2011) - [c38]Yuanfang Chen, Lei Shu
, Mingchu Li, Ziqi Fan, Lei Wang, Takahiro Hara:
The Insights of DV-Based Localization Algorithms in the Wireless Sensor Networks with Duty-Cycled and Radio Irregular Sensors. ICC 2011: 1-6 - [c37]Chi Lin, Guowei Wu, Mingchu Li, Xiaojie Chen, Zuosong Liu, Lin Yao:
A Selfish Node Preventive Real Time Fault Tolerant Routing Protocol for WSNs. iThings/CPSCom 2011: 330-337 - [c36]Zongqiang Zhang, Mingchu Li, Feng Xia
, Jianhua Ma:
An Improved Iris Localization Method for Authentication System. iThings/CPSCom 2011: 663-666 - [c35]Dong Jiao, Mingchu Li, Cheng Guo, Jianhua Ma:
A Multi-attribute Hierarchical Threshold Scheme. iThings/CPSCom 2011: 667-671 - [c34]Shuai Yue, Zhi-Hui Wang, Ching-Yun Chang, Chin-Chen Chang, Mingchu Li:
Image Data Hiding Schemes Based on Graph Coloring. UIC 2011: 476-489 - [e3]Xiamu Niu, Mingchu Li, Yôiti Suzuki, Jeng-Shyang Pan, Lakhmi C. Jain:
Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2011, Dalian, China, October 14-16, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1397-2 [contents] - 2010
- [j35]Hong-Jian Lai, Mingchu Li, Yehong Shao, Liming Xiong:
Spanning eulerian subgraphs in N2-locally connected claw-free graphs. Ars Comb. 94 (2010) - [j34]Liming Xiong, Mingchu Li:
Supereulerian index is stable under contractions and closures. Ars Comb. 97 (2010) - [j33]Weifeng Sun, Juanyun Wang, Boxiang Dong, Mingchu Li, Zhenquan Qin:
A Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concerned in Grid. Int. J. Inf. Process. Manag. 1(2): 103-114 (2010) - [j32]Chin-Chen Chang, Pei-Yu Lin
, Zhi-Hui Wang, Mingchu Li:
A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper). J. Commun. 5(1): 5-12 (2010) - [j31]Zhi-Hui Wang, The Duc Kieu, Chin-Chen Chang, Mingchu Li:
A Novel Information Concealing Method Based on Exploiting Modification Direction. J. Inf. Hiding Multim. Signal Process. 1(1): 1-9 (2010) - [j30]Zhi-Hui Wang, Chin-Chen Chang, Kuo-Nan Chen, Mingchu Li:
An encoding method for both image compression and data lossless information hiding. J. Syst. Softw. 83(11): 2073-2082 (2010) - [j29]Yu Zong, Guandong Xu, Yanchun Zhang, He Jiang, Mingchu Li:
A robust iterative refinement clustering algorithm with smoothing search space. Knowl. Based Syst. 23(5): 389-396 (2010) - [c33]Chin-Chen Chang, Kuo-Nan Chen, Zhi-Hui Wang, Mingchu Li:
A technique of embedding digital data in an image compression code reversibly. ICUIMC 2010: 13 - [c32]Zhi-Hui Wang, Chin-Chen Chang, Mingchu Li, Tzu-Chuen Lu:
A simple image encoding method with data lossless information hiding. ICUIMC 2010: 44 - [c31]Yanchuan Huang, Mingchu Li, Chuang Lin, Linlin Tian:
Gabor-Based Kernel Independent Component Analysis for Face Recognition. IIH-MSP 2010: 376-379 - [c30]Weifeng Sun, Boxiang Dong
, Zhenquan Qin
, Juanyun Wang, Mingchu Li:
A Low-Level Security Solving Method in Grid. IIH-MSP 2010: 727-730 - [c29]Zhenquan Qin
, Lei Wang, Mingchu Li, Weifeng Sun:
An Efficient Trust Mechanism in P2P Network. IIH-MSP 2010: 731-734 - [c28]Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai:
SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid. IPDPS Workshops 2010: 1-8 - [c27]Qiufen Xia, Weifeng Sun, Zichuan Xu, Mingchu Li:
A Novel Grid Resource Scheduling Model Based on Extended Second Price Sealed Auction. PAAP 2010: 305-310 - [c26]Weifeng Sun, Yudan Zhu, Zhiyuan Su, Dong Jiao, Mingchu Li:
A Priority-Based Task Scheduling Algorithm in Grid. PAAP 2010: 311-315 - [c25]Xinxin Fan, Mingchu Li, Yizhi Ren, Jianhua Ma:
Dual-EigenRep: A Reputation-Based Trust Model for P2P File-Sharing Networks. UIC/ATC Workshops 2010: 358-363 - [c24]Feng Xia
, Zhenzhen Xu, Lin Yao, Weifeng Sun, Mingchu Li:
Prediction-based Data Transmission for Energy Conservation in Wireless Body Sensors. WICON 2010: 1-9 - [e2]Tai-Hoon Kim, Alan Chin-Chen Chang, Mingchu Li, Chunming Rong, Charalampos Z. Patrikakis, Dominik Slezak:
Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part I. Communications in Computer and Information Science 119, Springer 2010, ISBN 978-3-642-17586-2 [contents]
2000 – 2009
- 2009
- [j28]Mingchu Li, Yongrui Cui, Liming Xiong, Yuan Tian, He Jiang, Xu Yuan:
Circumferences and minimum degrees in 3-connected claw-free graphs. Discret. Math. 309(11): 3580-3587 (2009) - [j27]Yongrui Cui, Mingchu Li, Yizhi Ren, Kouichi Sakurai:
An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(5): 1339-1346 (2009) - [j26]Cheng Guo, Mingchu Li, Kouichi Sakurai:
A New Secret Sharing Scheme Based on the Multi-Dealer. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(5): 1373-1378 (2009) - [j25]Yizhi Ren, Mingchu Li, Kouichi Sakurai:
Modeling Security Bridge Certificate Authority Architecture. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(6): 1544-1547 (2009) - [j24]Zhi-Hui Wang, Chin-Chen Chang, Chia-Chen Lin
, Mingchu Li:
A reversible information hiding scheme using left-right and up-down chinese character representation. J. Syst. Softw. 82(8): 1362-1369 (2009) - [c23]Jing Hu, Mingchu Li, Weifeng Sun, Yuanfang Chen:
An Ant Colony Optimization for Grid Task Scheduling with Multiple QoS Dimensions. GCC 2009: 415-419 - [c22]Zhi-Hui Wang, Mingchu Li, Mao-Hua Chen, Chin-Chen Chang:
A New Intelligent Authorization Agent Model in Grid. HIS (1) 2009: 394-398 - [c21]Chin-Chen Chang, Chi-Shiang Chan, Zhi-Hui Wang, Mingchu Li:
Reversible Steganography for VQ Indices Using the Modified State Codebook. IIH-MSP 2009: 320-323 - [c20]The Duc Kieu, Chin-Chen Chang, Zhi-Hui Wang, Mingchu Li:
Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows. IIH-MSP 2009: 324-327 - [c19]Jingyu Hua, Mingchu Li, Kouichi Sakurai, Yizhi Ren:
Efficient Intrusion Detection Based on Static Analysis and Stack Walks. IWSEC 2009: 158-173 - [c18]Yuanfang Chen, Mingchu Li, Lei Wang, Zhuxiu Yuan, Weiping Sun, Chunsheng Zhu, Ming Zhu, Lei Shu
:
A Proportional Fair Backoff Scheme for Wireless Sensor Networks. MASS 2009: 971-976 - [c17]Jinpei Pan, Mingchu Li, Weifeng Sun, Jing Hu:
A Mediated RSA-Based End Entity Certificates Revocation Mechanism in Grid. NCM 2009: 247-250 - [e1]Dominik Slezak, Tai-Hoon Kim, Alan Chin-Chen Chang, Thanos Vasilakos, Mingchu Li, Kouichi Sakurai:
Communication and Networking - International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 56, Springer 2009, ISBN 978-3-642-10843-3 [contents] - [i1]Feng Xia, Zhenzhen Xu, Lin Yao, Weifeng Sun, Mingchu Li:
Prediction-Based Data Transmission for Energy Conservation in Wireless Body Sensors. CoRR abs/0912.2430 (2009) - 2008
- [j23]He Jiang, Xianchao Zhang, Guoliang Chen, Mingchu Li:
Backbone analysis and algorithm design for the quadratic assignment problem. Sci. China Ser. F Inf. Sci. 51(5): 476-488 (2008) - [j22]Mingchu Li, Liming Xiong, Haitze J. Broersma
:
Connected even factors in claw-free graphs. Discret. Math. 308(11): 2282-2284 (2008) - [j21]Liming Xiong, Qiuxin Wu, Mingchu Li:
Radius and subpancyclicity in line graphs. Discret. Math. 308(23): 5325-5333 (2008) - [c16]Mingchu Li, Yizhi Ren, Kouichi Sakurai, Yongrui Cui, Zhi-Hui Wang:
Granularity Considering in a Trust Model for P2P Networks. AINA Workshops 2008: 307-312 - [c15]Yizhi Ren, Mingchu Li, Cheng Guo, Yongrui Cui, Kouichi Sakurai:
Trust Similarity Measure in Trust Model for P2P Networks. EUC (2) 2008: 107-112 - [c14]Mingchu Li, Yongrui Cui, Yizhi Ren, Yuan Tian:
Intelligent Security Multi-agent Framework in Grid Computing. ICNSC 2008: 1142-1147 - [c13]Yu Zong, Xianchao Zhang, He Jiang, Mingchu Li:
A Creditable Subspace Labeling Method Based on D-S Evidence Theory. PAKDD 2008: 839-848 - 2007
- [j20]Mingchu Li, Cheng Guo, Liming Xiong, Dengxin Li, Hong-Jian Lai:
Quadrangularly connected claw-free graphs. Discret. Math. 307(9-10): 1205-1211 (2007) - [j19]Liming Xiong, Mingchu Li:
On the 2-factor index of a graph. Discret. Math. 307(21): 2478-2483 (2007) - [c12]He Jiang, Xianchao Zhang, Mingchu Li:
Backbone of the p-Median Problem. Australian Conference on Artificial Intelligence 2007: 699-704 - [c11]He Jiang, Xianchao Zhang, Mingchu Li, Haoyang Che:
Using Gavish-Grave LP to Formulate the Directed Black and White Traveling Salesman Problem. International Conference on Computational Science (3) 2007: 293-298 - [c10]Mingchu Li, Liming Xiong, Hong Liu:
Linear Polynomial-Time Algorithms To Construct 4-Connected 4-Regular Locally Connected Claw-Free Graphs. International Conference on Computational Science (3) 2007: 329-333 - 2006
- [j18]Mingchu Li:
Circumferences of regular claw-free graphs. Discret. Math. 306(21): 2682-2694 (2006) - [c9]Mingchu Li, Hongyan Yao, Jianbo Ma:
Recovery Mechanism of Online Certification Chain in Grid Computing. ARES 2006: 558-562 - [c8]Mingchu Li, Hongyan Yao:
Recovery Mechanism of Cooperative Process Chain in Grid. ARES 2006: 571-576 - [c7]Mingchu Li, Yongrui Cui, Yuan Tian, Dong Wang, Songyuan Yan:
A New Architecture of Grid Security System Construction. ICPP Workshops 2006: 100-108 - 2005
- [j17]Mingchu Li, Liming Xiong:
Circumferences and Minimum Degrees in 3-Connected Claw-Free Graphs. Electron. Notes Discret. Math. 22: 93-99 (2005) - [j16]Tomás Kaiser
, Mingchu Li, Zdenek Ryjácek, Liming Xiong:
Hourglasses and Hamilton cycles in 4-connected claw-free graphs. J. Graph Theory 48(4): 267-276 (2005) - [c6]Weisheng Si, Mingchu Li:
On the Connectedness of Peer-to-Peer Overlay Networks. ICPADS (1) 2005: 474-480 - 2004
- [j15]Liming Xiong, Hajo Broersma
, Xueliang Li, Mingchu Li:
The hamiltonian index of a graph and its branch-bonds. Discret. Math. 285(1-3): 279-288 (2004) - [j14]Mingchu Li:
Hamiltonian Connected Claw-Free Graphs. Graphs Comb. 20(3): 341-362 (2004) - [c5]Xiaobing Sun, Jizhou Sun, Jiawan Zhang, Mingchu Li:
Simple zoom-lens digital camera calibration method based on EXIF. Three-Dimensional Image Capture and Applications 2004: 79-86 - [c4]Yan Liu, Jizhou Sun, Jiawan Zhang, Mingchu Li:
Vision-based navigation in a dynamic environment for virtual human. Human Vision and Electronic Imaging 2004: 397-401 - [c3]Qing Xu, Roberto Brunelli, Stefano Messelodi, Jiawan Zhang, Mingchu Li:
Image Coherence Based Adaptive Sampling for Image Synthesis. ICCSA (2) 2004: 693-702 - [c2]Qing Xu, Liang Ma, Mingchu Li, Wei Wang, Jing Cai, Roberto Brunelli, Stefano Messelodi:
Fuzzy weighted average filtering for mixture noises. ICIG 2004: 18-21 - [c1]Jiawan Zhang, Jizhou Sun, Zhigang Sun, Mingchu Li, Xiaobing Sun, Yan Liu:
A new object-order volume-rendering algorithm based on two-step lookup tables. Visualization and Data Analysis 2004: 256-263 - 2003
- [j13]Mingchu Li:
Circumferences of 2-Connected Claw-Free Graphs. Ars Comb. 67 (2003) - 2002
- [j12]Mingchu Li:
Hamiltonian Cycles in N2-Locally Connected Claw-Free Graphs. Ars Comb. 62 (2002) - 2001
- [j11]Mingchu Li:
Hamiltonian Cycles in Almost Claw-Free Graphs. Graphs Comb. 17(4): 687-706 (2001) - 2000
- [j10]Mingchu Li, Derek G. Corneil, Eric Mendelsohn:
Pancyclicity and NP-completeness in Planar Graphs. Discret. Appl. Math. 98(3): 219-225 (2000) - [j9]Mingchu Li:
On hamiltonian connectedness of K1, 4-free graphs. Discret. Math. 216(1-3): 279-285 (2000) - [j8]Mingchu Li:
Longest Cycles in Almost Claw-Free Graphs. Graphs Comb. 16(2): 177-198 (2000)
1990 – 1999
- 1998
- [j7]Mingchu Li:
On Pancyclic Claw-Free Graphs. Ars Comb. 50 (1998) - [j6]Mingchu Li:
Vertex pancyclism in claw-free graphs. Discret. Math. 188(1-3): 151-173 (1998) - [j5]Mingchu Li:
Hamiltonian Connectedness in Claw-Free Graphs. Graphs Comb. 14(1): 45-58 (1998) - 1996
- [j4]Mingchu Li:
Hamiltonian cycles in regular 3-connected claw-free graphs. Discret. Math. 156(1-3): 171-196 (1996) - 1995
- [j3]Mingchu Li:
Longest cycles in regular 2-connected claw-free graphs. Discret. Math. 137(1-3): 277-295 (1995) - 1994
- [j2]Mingchu Li:
Two edge-disjoint hamiltonian cycles in graphs. Graphs Comb. 10(2-4): 169-178 (1994) - 1993
- [j1]Mingchu Li:
Hamiltonian cycles in 3-connected claw-free graphs. J. Graph Theory 17(3): 303-313 (1993)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint